Lucene search

K
IbmSpectrum Protect Operations Center

6 matches found

CVE
CVE
added 2019/07/02 3:15 p.m.77 views

CVE-2019-4129

IBM Spectrum Protect Operations Center 7.1 and 8.1 could allow a remote attacker to obtain sensitive information, caused by an error message containing a stack trace. By creating an error with a stack trace, an attacker could exploit this vulnerability to potentially obtain details on the Operation...

5.3CVSS5AI score0.00371EPSS
CVE
CVE
added 2022/05/17 4:15 p.m.68 views

CVE-2022-22484

IBM Spectrum Protect Operations Center 8.1.12 and 8.1.13 could allow a local attacker to obtain sensitive information, caused by plain text user account passwords potentially being stored in the browser's application command history. By accessing browser history, an attacker could exploit this vuln...

5.5CVSS5.2AI score0.00019EPSS
CVE
CVE
added 2022/06/30 5:15 p.m.62 views

CVE-2022-22494

IBM Spectrum Protect Operations Center 8.1.0.000 through 8.1.14 could allow a remote attacker to gain details of the database, such as type and version, by sending a specially-crafted HTTP request. This information could then be used in future attacks. IBM X-Force ID: 226940.

5.3CVSS5.2AI score0.00244EPSS
CVE
CVE
added 2021/12/13 7:15 p.m.46 views

CVE-2021-38901

IBM Spectrum Protect Operations Center 7.1, under special configurations, could allow a local user to obtain highly sensitive information. IBM X-Force ID: 209610.

5.5CVSS5.1AI score0.0004EPSS
CVE
CVE
added 2021/02/15 3:15 p.m.38 views

CVE-2020-4954

IBM Spectrum Protect Operations Center 7.1 and 8.1 could allow a remote attacker to bypass authentication restrictions, caused by improper session validation . By using the configuration panel to obtain a valid session using an attacker controlled IBM Spectrum Protect server, an attacker could expl...

5.4CVSS6.2AI score0.00088EPSS
CVE
CVE
added 2020/11/23 5:15 p.m.33 views

CVE-2020-4771

IBM Spectrum Protect Operations Center 8.1.0.000 through 8.1.10.and 7.1.0.000 through 7.1.11 could allow a remote attacker to obtain sensitive information, caused by improper authentication of a websocket endpoint. By using known tools to subscribe to the websocket event stream, an attacker could e...

5.3CVSS5.2AI score0.00142EPSS